---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Tivoli Netcool/Webtop Security Issue and Information Disclosure Vulnerability SECUNIA ADVISORY ID: SA32036 VERIFY ADVISORY: http://secunia.com/advisories/32036/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, Privilege escalation WHERE: >From remote SOFTWARE: IBM Tivoli Netcool/Webtop 2.x http://secunia.com/advisories/product/19968/ DESCRIPTION: A vulnerability and a security issue have been reported in Tivoli Netcool/Webtop, which can be exploited by malicious users to gain escalated privileges and by malicious people to disclose sensitive information. 1) A security issue exists due to the application using cached user permissions, which can be exploited to gain access to Webtop with escalated privileges. Successful exploitation requires valid user credentials, and that an attacker has access to a browser that has been used to login to Webtop and has not been closed. 2) A vulnerability in Tomcat can be exploited by malicious people to disclose sensitive information. For more information see vulnerability #2 in: SA28878 The vulnerability and the security issue are reported in Tivoli Netcool/Webtop 2.1.0 prior to Fix Pack 5. SOLUTION: Update to Tivoli Netcool/Webtop 2.1.0 Fix Pack 5. PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor. ORIGINAL ADVISORY: http://www-01.ibm.com/support/docview.wss?uid=swg24018932 http://www-01.ibm.com/support/docview.wss?uid=swg1IZ21888 OTHER REFERENCES: SA28878: http://secunia.com/advisories/28878/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------